Font Size: a A A

Security Authentication Protocol For RFID On Mobile Device And Software Implementation

Posted on:2017-04-20Degree:MasterType:Thesis
Country:ChinaCandidate:Q HouFull Text:PDF
GTID:2308330485957967Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
Radio frequency identification technology is one of the core technologies of sensing layer in the Internet of things. In recent years, the chip device price declining and the solutions constantly mature make RFID enter a new milestone. Technology and product are continually enhanced, which have been used symbolically in every field of production.Characteristics of RFID are as follow:strong anti-interference ability, fast speed, easy to control, etc. Among all these features, non-contact is the most obvious. Non-contract determines the way of communication between the reader and the tag goes through wireless channel, which has an inherent unsafe characteristic. The attacker can easily "hear" the messages between tag and reader, then make changes and control the dialogue, or get tag’s information. The attacker can destroy data synchronous between tag and reader, or track an attacked "victim" tag, or replay the hacked message to deceive the reader or tag. Consequently, more and more researchers are committed to improving the security of RFID system and the protection of users’ privacy. The RFID authentication protocol, which is a flexible way and relative low cost, has become the first choice for researchers in all methods.Authentication in RFID system requires the complex function as less as possible because of the limited computing and storage capacity of tag, which should be considered in authentication while improving system’s security. Ultralightweight protocol has the lowest computational complexity, which means the tag only need to do the bit operation. This paper is committed to improving RFID system’s security with an improved ultralightweight protocol. This paper conclude the general process of RFID authentication after analysis some authentication protocols, indicating potential security risks and giving corresponding solutions in the process. On the basis of certification process, this paper gives an improved ultralightweight authentication protocol----Tag Pseudo Random Protocol(TPRP), indicating that TRPR protocol can resist common attacks including asynchronous attack. The Android intelligent mobile phone is used as a platform for the realization of TPRP protocol because the industrial grade handheld reader is not the best choice for personal use. There is NFC function in some Android mobile phones, providing the hardware foundation for the interaction with RFID tag, and the mobile phones which do not support NFC will interact with tag through external RFID RF reader module.TPRP protocol software is developed on the Android platform of Eclipse and debugged on the Android phones in this paper. Meanwhile, this paper gives the authentication time of TPRP protocol and some ultralightweight protocols in Android phones. The results show that TPRP protocol can meet the low cost tags and the security requirements of RFID.
Keywords/Search Tags:RFID, RFID security, RFID authentication protocol, Android mobile phone
PDF Full Text Request
Related items